Feeds

Sweaty spooks feel the heat as NSA runs short of juice

Sweeping powers yes, electrical power no

Top 5 reasons to deploy VMware with Tegile

The National Security Agency (NSA), America's ultrasecret electronic spy agency, may be on the verge of a disastrous power overload at its Maryland headquarters.

According to the Baltimore Sun, energy supplies to the NSA's Fort Meade head-shed have been under strain for some time, with problems reaching a critical level last year. The secretive spook agency's love of uber-fast supercomputers has apparently sent demand surging beyond the ability of the local grid to cope.

Drastic measures have already been introduced to redistribute and ration power. Some offices were reportedly left unheated last winter, forcing staff to work in gloves and coats. The work of a typical NSA employee is keyboard based, and the Sun reports that the freezing offices "made for challenging typing."

Now that summer is arriving, power demands are expected to get even worse, as high-powered computers belch heat into overburdened data-centre cooling systems. Apparently the air-con for humans has already been throttled back.

"In the morning, it's like a sweatshop," grumbled one perspiration-drenched spook to the Sun. Conspiracy theorists will no doubt be overjoyed at the prospect of being able to detect some of the most feared federal operatives by smell, or perhaps damp patches on their black suits.

There have also been planned, rolling brownouts and other measures to redistribute power at Fort Meade. It seems that these days, if you are a lower-priority enemy of America, your scrambled satphone call may not get decrypted until the weekend - when there's enough electricity to fire up a few more Crays. If you're a US citizen making an international call, your warrantlessly-obtained wiretap recordings may not get analysed until a cool day comes along.

It isn't just the ordinary working spooks who are sweating as they pore over intercept traffic and argue about the black-helicopter fuel bills (or whatever). NSA chiefs have also been taking a grilling on Capitol Hill, as oversight committee members criticise them for not sorting matters out sooner.

It seems that the current power situation at Fort Meade was being foretold as long ago as 1998, but no serious rectification efforts began until last year. Even then, reportedly, NSA bigwigs had to divert funds out of important spying efforts owing to failure to plan ahead - and omitted to ask for permission. Not so much a question of watching the watchers, as one of there being no watching to watch.

Plans are in hand to fix the problems, backed up by more than $800m in funding increases for the NSA in the coming year. Even so, it could be a summer or two yet before the spies come back into the cold.

Full details from the Sun here

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
NASA launches new climate model at SC14
75 days of supercomputing later ...
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
BOFH: WHERE did this 'fax-enabled' printer UPGRADE come from?
Don't worry about that cable, it's part of the config
Stop the IoT revolution! We need to figure out packet sizes first
Researchers test 802.15.4 and find we know nuh-think! about large scale sensor network ops
SanDisk vows: We'll have a 16TB SSD WHOPPER by 2016
Flash WORM has a serious use for archived photos and videos
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.